• Florida Department of Education
  • Florida Department of Education Curriculum Framework




    Download 234.4 Kb.
    bet2/4
    Sana02.01.2022
    Hajmi234.4 Kb.
    #817
    1   2   3   4
    Additional Information relevant to this Career and Technical Education (CTE) program is provided at the end of this document.


    Standards

    After successfully completing this program, the student will be able to perform the following:




    1. Design, develop and implement physical, network, host, application, and user security systems for E-Business.

    2. Maintain and monitor security policies.



    2016 – 2017

    Florida Department of Education

    Student Performance Standards




    Program Title: E-Business Security Technical Certificate

    CIP Number: 0552120102

    Program Length: 24 credit hours

    SOC Code(s): 15-1142





    This certificate program is part of the E-Business Technology AS degree program (1552120107). At the completion of this program, the student will be able to:

    1. Design, develop and implement physical, network, host, application and user security systems for e-business. ̶ The student will be able to:

      1. Explain use and purpose of security policies.

      1. Conduct a security audit.

      1. Control access to systems, resources and data.

      1. Explain and manage system security in common Operating Systems.

      1. Describe concepts of web servers and their role in the network.

      1. Plan and implement a web server.

      1. Identify the various hardware and software requirements for a web server.

      1. Explain how documents and files are stored on a web server.

      1. Describe different methods for projecting future traffic on a web server.

      1. Identify the necessary steps to ensure reliability and response of the server.

      1. Describe and implement the process for effectively organizing a web site.

      1. Install, configure, and maintain a Web server.

      1. Publish a web document so that it is easily located through various search engines on the Internet.

      1. Set up the web server so that dynamic content can be provided to users of the web site.

      1. Perform corrective and preventative maintenance on a web server.

      1. Analyze server log files to determine trends in web server utilization.

      1. Discuss Internet services operation and the security risk imposed by them on the network.

      1. Identify vulnerabilities in World Wide Web protocols and counter-measures for securing them.

      1. Describe the operation of electronic mail and news services protocols and how to effectively secure them.

      1. Describe the operation of file transfer and printing service protocols and how to effectively secure them.

      1. Describe the operation of remote access services protocols and how to effectively secure them.

      1. Describe the operation of real-time conferencing service protocols and how to effectively secure them.

      1. Properly configure and describe the operation of naming and directory services.

      1. Describe the operation of authentication and auditing services protocols and how to effectively secure them.

      1. Describe the operation of administrative services protocols and how to effectively secure them.

      1. Describe the operation of the IP Security protocol.

      1. Implement effective measures to secure various service protocols.

    1. Maintain and monitor security policies. ̶ The student will be able to:

      1. Identify basic network security.

      1. Describe purpose and use of packet sniffing, firewalls and proxies.

      1. Define web server security.

      1. Protect against the risks of directory browsing.

      1. Assess client security issues including ActiveX, JavaScript and Cookies.

      1. Install and configure network security tools.

      1. Explain the strengths, and weaknesses of cryptography as a security tool.

      1. Describe authentication and identification schemes.

      1. Define secure software.

      1. Describe the use and purpose of encryption.

      1. Define the advantages of Secure Socket Layer (SSL).

      1. Define certificate authority.

      1. Identify basic aspects of intrusion detection and steps to protect the web server from these threats.

      1. Explain the history of cryptographic methodology.

      1. Describe cryptographic attack models.

      1. Describe the secret key and public key encryption methodology.

      1. Use hashing techniques.

      1. Use digital signatures in a network environment.

      1. Explain applied cryptography.

      1. Use authentication processes in heterogeneous environments.

      1. Create secure environment through defensive programming.

      1. Explain the basic elements of Security Testing and Auditing.

      1. Describe the capabilities of effective signature filter techniques.

      1. Explain the importance of architectural design detection of intrusions.

      1. Describe interoperability aspects of various commercial IDS solutions.

      1. Define and utilize various network based Intrusion Detection Solutions (IDS).

      1. Detect various exploitation attempts in a network environment.

      1. Explain intrusion detection and denial of service.

      1. Describe techniques for gathering intelligence on intrusion detection and the latest tools and techniques used by hackers.

      1. Define and recognize structured attacks and differentiate from unstructured attacks.

      1. Explain management issues related to intrusion detection.

      1. Implement appropriate security measures following risk analysis.

      1. Implement appropriate security measures to minimize risks from hackers.

      1. Issue and manage digital certificates.





    Download 234.4 Kb.
    1   2   3   4




    Download 234.4 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Florida Department of Education Curriculum Framework

    Download 234.4 Kb.